uCertify CISM – Certified Information Security Manager LiveLab
uCertify CISM – Certified Information Security Manager LiveLab
· Lesson 4: Enabling Intrusion Prevention and Detection
· Lesson 5: Configuring SNORT
uCertify Cybersecurity Essentials LiveLabs
· Lesson 5: Using Microsoft File Encryption Tools
Using your lab results, write a 2- to 3-page analysis that provides an assessment of technical security management methods found in the labs and the reading. You should identify a minimum of three methods as well as specifying what element the technical security management method relates to, such as intrusion detection, encryption, or access control. An example would be discovering that the organization has no classification system in place for categorizing data as being public, sensitive, or secret. The mitigation strategy would be establishing a consistent classification standard that would in turn inform how each category of data is accessed and stored.
Unit 5 Assignment: Technical Security Management
Outcomes addressed in this activity:
Unit Outcomes:
· Prepare a technical scenario concisely and persuasively.
· Use appropriate cybersecurity terminology to meet business needs.
Course Outcome:
IT537-3: Analyze technical scenario elements to determine strategy.
Purpose
Technical Security Management has several important functions including adherence to the company’s security policies, business application security standards, cloud security standards, encryption management, intrusion detection and prevention, as well as malware protection and secure coding practices. These are all used to provide the organization with a sound and effective security infrastructure that protects the network in a consistent and centrally managed manner.
Assignment Instructions
Create an analysis assessing a minimum of three technical security management methods discovered in your lab results and the reading. Feel free to include more methods in your analysis, but three should be the minimum. Be sure to note whether the technical security management method is specific to a physical on-premises component or a cloud/virtual component. Following your technical security management analysis, provide 2–3 pages of discussion that includes a description of the technical security management methods, how each of the methods relates to risk for the organization, and how each method mitigates that risk.
The minimum page count is 2–3 pages (excluding title page, etc.). If you require more pages to thoroughly discuss the identified methods, then include them.
Your paper should use Times New Roman 12-point font, be double spaced, and use correct APA formatting (title page and reference page). Be sure to use proper APA in-text citations that match your reference list.
In accordance with the Academic Integrity Policy, your assignment will be automatically submitted to TurnItIn. The policy states that papers submitted for credit in any course should contain less than 25% non-original material, so avoid large sections of direct quotes and be sure that you use APA formatting to properly cite and reference all non-original material.
Assignment Requirements
· The analysis provides a detailed assessment of a minimum of three technical security management methods identified from the labs and the reading.
· The descriptive section of the analysis is a minimum of 2–3 pages of content (excluding title page, etc.) and uses Times New Roman 12-point font, is double spaced, and uses correct APA formatting (title page and reference page).
· No spelling errors.
· No grammar errors.
· No APA style errors.
For more information on APA style formatting, refer to the resources in the Academic Tools area of this course.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.